September 2018

Participants gain insights into the techniques used by cyber criminals to steal personal information. They learn various techniques that enable them to make informed decisions when selecting user ids, passwords, and “shared secrets” for authenticating themselves to social media and the Internet, and the importance of multifactor authentication to enhance their own security. PLEASE REGISTER The benefits and challenges of using cloud computing for personal data storage are also explained. Participants also attain strategies to protect their personal information from…

Participants discover how controlling access to facilities, systems, and information using facial and voice recognition, fingerprint readers, iris and retinal scanners, and hand geometry readers often seen in spy films and TV actually work. They also review basic data security concepts and strategies to protect personal information from misuse and how cryptography and steganography are used to protect (and hide) sensitive information. PLEASE REGISTER The benefits and challenges of using cloud computing for personal data storage are also explained. Participants also…

This seminar explains how sophisticated organizations with highly trained security professionals fall victim to devastating information breaches. It focuses on how security weaknesses such as poor password and vendor management and the effectiveness of phishing/spear phishing, led to the break ins at Equifax, Target, Neiman Marcus, Home Depot, Sony Pictures, and the Federal government's Office of Personnel Management. It describes techniques the hackers used to exploit system vulnerabilities that led to their access and control of those systems, often undetected.…